Ariel Hamlin
Ariel Hamlin
Northeastern University, MIT Lincoln Lab
Verified email at
Cited by
Cited by
Sok: Cryptographically protected database search
B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ...
2017 IEEE Symposium on Security and Privacy (SP), 172-191, 2017
Multi-key searchable encryption, revisited
A Hamlin, A Shelat, M Weiss, D Wichs
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
Private anonymous data access
A Hamlin, R Ostrovsky, M Weiss, D Wichs
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
Cryptography for Big Data Security.
A Hamlin, N Schear, E Shen, M Varia, S Yakoubov, A Yerukhimovich
IACR Cryptol. ePrint Arch. 2016, 12, 2016
Automated assessment of secure search systems
M Varia, B Price, N Hwang, A Hamlin, J Herzog, J Poland, M Reschly, ...
ACM SIGOPS Operating Systems Review 49 (1), 22-30, 2015
Unifying leakage classes: Simulatable leakage and pseudoentropy
B Fuller, A Hamlin
Information Theoretic Security: 8th International Conference, ICITS 2015 …, 2015
Don't even ask: Database access control through query control
R Shay, U Blumenthal, V Gadepally, A Hamlin, JD Mitchell, ...
ACM SIGMOD Record 47 (3), 17-22, 2019
Two-server distributed ORAM with sublinear computation and constant rounds
A Hamlin, M Varia
IACR International Conference on Public-Key Cryptography, 499-527, 2021
On the plausibility of fully homomorphic encryption for RAMs
A Hamlin, J Holmgren, M Weiss, D Wichs
Annual International Cryptology Conference, 589-619, 2019
Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric
C Cachet, S Ahmad, L Demarest, S Riback, A Hamlin, B Fuller
Information and Computation 293, 105059, 2023
A test-suite generator for database systems
A Hamlin, J Herzog
2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014
Proximity searchable encryption for the iris biometric
C Cachet, S Ahmad, L Demarest, A Hamlin, B Fuller
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
Security and privacy assurance research (spar) pilot final report
B Fuller, D Mitchell, R Cunningham, U Blumenthal, P Cable, A Hamlin, ...
Technical report, MIT Lincoln Laboratory Lexington United States, 2015
Upgrading Fuzzy Extractors
C Cachet, A Hamlin, M Rezapour, B Fuller
International Conference on Applied Cryptography and Network Security, 156-182, 2024
Applications of Doubly Efficient Private Information Retrieval
ATL Hamlin
Northeastern University, 2021
Fully Homomorphic Encryption for RAMs
A Hamlin, J Holmgren, M Weiss, D Wichs
Cryptology ePrint Archive, 2019
PACE: Proactively-Secure Accumulo with Cryptographic Enforcement
S Ruoti, A Hamlin, E Shen, C Sparks, R Cunningham
Cryptography for Big Data Security........................ and Arkady Yerukhimovich
A Hamlin, N Schear, E Shen, M Varia, S Yakoubov
Big Data, 257-304, 2016
SoK: cryptographically protected database search
A Hamlin, V Gadepally, R Shay, JD Mitchell
Applications of Doubly Efficient PIR
A Hamlin
The system can't perform the operation now. Try again later.
Articles 1–20